notification.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416
  1. /*
  2. * Copyright (C) 2008 Red Hat, Inc., Eric Paris <eparis@redhat.com>
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation; either version 2, or (at your option)
  7. * any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; see the file COPYING. If not, write to
  16. * the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
  17. */
  18. /*
  19. * Basic idea behind the notification queue: An fsnotify group (like inotify)
  20. * sends the userspace notification about events asyncronously some time after
  21. * the event happened. When inotify gets an event it will need to add that
  22. * event to the group notify queue. Since a single event might need to be on
  23. * multiple group's notification queues we can't add the event directly to each
  24. * queue and instead add a small "event_holder" to each queue. This event_holder
  25. * has a pointer back to the original event. Since the majority of events are
  26. * going to end up on one, and only one, notification queue we embed one
  27. * event_holder into each event. This means we have a single allocation instead
  28. * of always needing two. If the embedded event_holder is already in use by
  29. * another group a new event_holder (from fsnotify_event_holder_cachep) will be
  30. * allocated and used.
  31. */
  32. #include <linux/fs.h>
  33. #include <linux/init.h>
  34. #include <linux/kernel.h>
  35. #include <linux/list.h>
  36. #include <linux/module.h>
  37. #include <linux/mount.h>
  38. #include <linux/mutex.h>
  39. #include <linux/namei.h>
  40. #include <linux/path.h>
  41. #include <linux/slab.h>
  42. #include <linux/spinlock.h>
  43. #include <asm/atomic.h>
  44. #include <linux/fsnotify_backend.h>
  45. #include "fsnotify.h"
  46. static struct kmem_cache *fsnotify_event_cachep;
  47. static struct kmem_cache *fsnotify_event_holder_cachep;
  48. /*
  49. * This is a magic event we send when the q is too full. Since it doesn't
  50. * hold real event information we just keep one system wide and use it any time
  51. * it is needed. It's refcnt is set 1 at kernel init time and will never
  52. * get set to 0 so it will never get 'freed'
  53. */
  54. static struct fsnotify_event q_overflow_event;
  55. static atomic_t fsnotify_sync_cookie = ATOMIC_INIT(0);
  56. /**
  57. * fsnotify_get_cookie - return a unique cookie for use in synchronizing events.
  58. * Called from fsnotify_move, which is inlined into filesystem modules.
  59. */
  60. u32 fsnotify_get_cookie(void)
  61. {
  62. return atomic_inc_return(&fsnotify_sync_cookie);
  63. }
  64. EXPORT_SYMBOL_GPL(fsnotify_get_cookie);
  65. /* return true if the notify queue is empty, false otherwise */
  66. bool fsnotify_notify_queue_is_empty(struct fsnotify_group *group)
  67. {
  68. BUG_ON(!mutex_is_locked(&group->notification_mutex));
  69. return list_empty(&group->notification_list) ? true : false;
  70. }
  71. void fsnotify_get_event(struct fsnotify_event *event)
  72. {
  73. atomic_inc(&event->refcnt);
  74. }
  75. void fsnotify_put_event(struct fsnotify_event *event)
  76. {
  77. if (!event)
  78. return;
  79. if (atomic_dec_and_test(&event->refcnt)) {
  80. if (event->data_type == FSNOTIFY_EVENT_PATH)
  81. path_put(&event->path);
  82. BUG_ON(!list_empty(&event->private_data_list));
  83. kfree(event->file_name);
  84. kmem_cache_free(fsnotify_event_cachep, event);
  85. }
  86. }
  87. struct fsnotify_event_holder *fsnotify_alloc_event_holder(void)
  88. {
  89. return kmem_cache_alloc(fsnotify_event_holder_cachep, GFP_KERNEL);
  90. }
  91. void fsnotify_destroy_event_holder(struct fsnotify_event_holder *holder)
  92. {
  93. kmem_cache_free(fsnotify_event_holder_cachep, holder);
  94. }
  95. /*
  96. * Find the private data that the group previously attached to this event when
  97. * the group added the event to the notification queue (fsnotify_add_notify_event)
  98. */
  99. struct fsnotify_event_private_data *fsnotify_remove_priv_from_event(struct fsnotify_group *group, struct fsnotify_event *event)
  100. {
  101. struct fsnotify_event_private_data *lpriv;
  102. struct fsnotify_event_private_data *priv = NULL;
  103. assert_spin_locked(&event->lock);
  104. list_for_each_entry(lpriv, &event->private_data_list, event_list) {
  105. if (lpriv->group == group) {
  106. priv = lpriv;
  107. list_del(&priv->event_list);
  108. break;
  109. }
  110. }
  111. return priv;
  112. }
  113. /*
  114. * Check if 2 events contain the same information. We do not compare private data
  115. * but at this moment that isn't a problem for any know fsnotify listeners.
  116. */
  117. static bool event_compare(struct fsnotify_event *old, struct fsnotify_event *new)
  118. {
  119. if ((old->mask == new->mask) &&
  120. (old->to_tell == new->to_tell) &&
  121. (old->data_type == new->data_type) &&
  122. (old->name_len == new->name_len)) {
  123. switch (old->data_type) {
  124. case (FSNOTIFY_EVENT_INODE):
  125. /* remember, after old was put on the wait_q we aren't
  126. * allowed to look at the inode any more, only thing
  127. * left to check was if the file_name is the same */
  128. if (old->name_len &&
  129. !strcmp(old->file_name, new->file_name))
  130. return true;
  131. break;
  132. case (FSNOTIFY_EVENT_PATH):
  133. if ((old->path.mnt == new->path.mnt) &&
  134. (old->path.dentry == new->path.dentry))
  135. return true;
  136. case (FSNOTIFY_EVENT_NONE):
  137. return true;
  138. };
  139. }
  140. return false;
  141. }
  142. /*
  143. * Add an event to the group notification queue. The group can later pull this
  144. * event off the queue to deal with. If the event is successfully added to the
  145. * group's notification queue, a reference is taken on event.
  146. */
  147. int fsnotify_add_notify_event(struct fsnotify_group *group, struct fsnotify_event *event,
  148. struct fsnotify_event_private_data *priv)
  149. {
  150. struct fsnotify_event_holder *holder = NULL;
  151. struct list_head *list = &group->notification_list;
  152. struct fsnotify_event_holder *last_holder;
  153. struct fsnotify_event *last_event;
  154. /* easy to tell if priv was attached to the event */
  155. INIT_LIST_HEAD(&priv->event_list);
  156. /*
  157. * There is one fsnotify_event_holder embedded inside each fsnotify_event.
  158. * Check if we expect to be able to use that holder. If not alloc a new
  159. * holder.
  160. * For the overflow event it's possible that something will use the in
  161. * event holder before we get the lock so we may need to jump back and
  162. * alloc a new holder, this can't happen for most events...
  163. */
  164. if (!list_empty(&event->holder.event_list)) {
  165. alloc_holder:
  166. holder = fsnotify_alloc_event_holder();
  167. if (!holder)
  168. return -ENOMEM;
  169. }
  170. mutex_lock(&group->notification_mutex);
  171. if (group->q_len >= group->max_events) {
  172. event = &q_overflow_event;
  173. /* sorry, no private data on the overflow event */
  174. priv = NULL;
  175. }
  176. spin_lock(&event->lock);
  177. if (list_empty(&event->holder.event_list)) {
  178. if (unlikely(holder))
  179. fsnotify_destroy_event_holder(holder);
  180. holder = &event->holder;
  181. } else if (unlikely(!holder)) {
  182. /* between the time we checked above and got the lock the in
  183. * event holder was used, go back and get a new one */
  184. spin_unlock(&event->lock);
  185. mutex_unlock(&group->notification_mutex);
  186. goto alloc_holder;
  187. }
  188. if (!list_empty(list)) {
  189. last_holder = list_entry(list->prev, struct fsnotify_event_holder, event_list);
  190. last_event = last_holder->event;
  191. if (event_compare(last_event, event)) {
  192. spin_unlock(&event->lock);
  193. mutex_unlock(&group->notification_mutex);
  194. if (holder != &event->holder)
  195. fsnotify_destroy_event_holder(holder);
  196. return -EEXIST;
  197. }
  198. }
  199. group->q_len++;
  200. holder->event = event;
  201. fsnotify_get_event(event);
  202. list_add_tail(&holder->event_list, list);
  203. if (priv)
  204. list_add_tail(&priv->event_list, &event->private_data_list);
  205. spin_unlock(&event->lock);
  206. mutex_unlock(&group->notification_mutex);
  207. wake_up(&group->notification_waitq);
  208. return 0;
  209. }
  210. /*
  211. * Remove and return the first event from the notification list. There is a
  212. * reference held on this event since it was on the list. It is the responsibility
  213. * of the caller to drop this reference.
  214. */
  215. struct fsnotify_event *fsnotify_remove_notify_event(struct fsnotify_group *group)
  216. {
  217. struct fsnotify_event *event;
  218. struct fsnotify_event_holder *holder;
  219. BUG_ON(!mutex_is_locked(&group->notification_mutex));
  220. holder = list_first_entry(&group->notification_list, struct fsnotify_event_holder, event_list);
  221. event = holder->event;
  222. spin_lock(&event->lock);
  223. holder->event = NULL;
  224. list_del_init(&holder->event_list);
  225. spin_unlock(&event->lock);
  226. /* event == holder means we are referenced through the in event holder */
  227. if (holder != &event->holder)
  228. fsnotify_destroy_event_holder(holder);
  229. group->q_len--;
  230. return event;
  231. }
  232. /*
  233. * This will not remove the event, that must be done with fsnotify_remove_notify_event()
  234. */
  235. struct fsnotify_event *fsnotify_peek_notify_event(struct fsnotify_group *group)
  236. {
  237. struct fsnotify_event *event;
  238. struct fsnotify_event_holder *holder;
  239. BUG_ON(!mutex_is_locked(&group->notification_mutex));
  240. holder = list_first_entry(&group->notification_list, struct fsnotify_event_holder, event_list);
  241. event = holder->event;
  242. return event;
  243. }
  244. /*
  245. * Called when a group is being torn down to clean up any outstanding
  246. * event notifications.
  247. */
  248. void fsnotify_flush_notify(struct fsnotify_group *group)
  249. {
  250. struct fsnotify_event *event;
  251. struct fsnotify_event_private_data *priv;
  252. mutex_lock(&group->notification_mutex);
  253. while (!fsnotify_notify_queue_is_empty(group)) {
  254. event = fsnotify_remove_notify_event(group);
  255. /* if they don't implement free_event_priv they better not have attached any */
  256. if (group->ops->free_event_priv) {
  257. spin_lock(&event->lock);
  258. priv = fsnotify_remove_priv_from_event(group, event);
  259. spin_unlock(&event->lock);
  260. if (priv)
  261. group->ops->free_event_priv(priv);
  262. }
  263. fsnotify_put_event(event); /* matches fsnotify_add_notify_event */
  264. }
  265. mutex_unlock(&group->notification_mutex);
  266. }
  267. static void initialize_event(struct fsnotify_event *event)
  268. {
  269. event->holder.event = NULL;
  270. INIT_LIST_HEAD(&event->holder.event_list);
  271. atomic_set(&event->refcnt, 1);
  272. spin_lock_init(&event->lock);
  273. event->path.dentry = NULL;
  274. event->path.mnt = NULL;
  275. event->inode = NULL;
  276. event->data_type = FSNOTIFY_EVENT_NONE;
  277. INIT_LIST_HEAD(&event->private_data_list);
  278. event->to_tell = NULL;
  279. event->file_name = NULL;
  280. event->name_len = 0;
  281. event->sync_cookie = 0;
  282. }
  283. /*
  284. * fsnotify_create_event - Allocate a new event which will be sent to each
  285. * group's handle_event function if the group was interested in this
  286. * particular event.
  287. *
  288. * @to_tell the inode which is supposed to receive the event (sometimes a
  289. * parent of the inode to which the event happened.
  290. * @mask what actually happened.
  291. * @data pointer to the object which was actually affected
  292. * @data_type flag indication if the data is a file, path, inode, nothing...
  293. * @name the filename, if available
  294. */
  295. struct fsnotify_event *fsnotify_create_event(struct inode *to_tell, __u32 mask, void *data,
  296. int data_type, const char *name, u32 cookie)
  297. {
  298. struct fsnotify_event *event;
  299. event = kmem_cache_alloc(fsnotify_event_cachep, GFP_KERNEL);
  300. if (!event)
  301. return NULL;
  302. initialize_event(event);
  303. if (name) {
  304. event->file_name = kstrdup(name, GFP_KERNEL);
  305. if (!event->file_name) {
  306. kmem_cache_free(fsnotify_event_cachep, event);
  307. return NULL;
  308. }
  309. event->name_len = strlen(event->file_name);
  310. }
  311. event->sync_cookie = cookie;
  312. event->to_tell = to_tell;
  313. switch (data_type) {
  314. case FSNOTIFY_EVENT_FILE: {
  315. struct file *file = data;
  316. struct path *path = &file->f_path;
  317. event->path.dentry = path->dentry;
  318. event->path.mnt = path->mnt;
  319. path_get(&event->path);
  320. event->data_type = FSNOTIFY_EVENT_PATH;
  321. break;
  322. }
  323. case FSNOTIFY_EVENT_PATH: {
  324. struct path *path = data;
  325. event->path.dentry = path->dentry;
  326. event->path.mnt = path->mnt;
  327. path_get(&event->path);
  328. event->data_type = FSNOTIFY_EVENT_PATH;
  329. break;
  330. }
  331. case FSNOTIFY_EVENT_INODE:
  332. event->inode = data;
  333. event->data_type = FSNOTIFY_EVENT_INODE;
  334. break;
  335. case FSNOTIFY_EVENT_NONE:
  336. event->inode = NULL;
  337. event->path.dentry = NULL;
  338. event->path.mnt = NULL;
  339. break;
  340. default:
  341. BUG();
  342. }
  343. event->mask = mask;
  344. return event;
  345. }
  346. __init int fsnotify_notification_init(void)
  347. {
  348. fsnotify_event_cachep = KMEM_CACHE(fsnotify_event, SLAB_PANIC);
  349. fsnotify_event_holder_cachep = KMEM_CACHE(fsnotify_event_holder, SLAB_PANIC);
  350. initialize_event(&q_overflow_event);
  351. q_overflow_event.mask = FS_Q_OVERFLOW;
  352. return 0;
  353. }
  354. subsys_initcall(fsnotify_notification_init);